British Prime Minister wants access to messaging apps

British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies

Do you really need antivirus software for Linux desktops?

It started, innocently enough, as a question asked in the ESET Security Forum titled “Eset – Do I Really Need Antivirus On My Linux Distros?” However, the answer to that seemingly simple question on Linux antivirus is more complex than a simple yes-or-no response.

US military’s CENTCOM Twitter account hacked – were they not using 2FA?

Twitter and YouTube accounts run by the US military’s Central Command are hijacked by hackers claiming to back Islamic State.

Microsoft to end free Advance Security Notifications

Microsoft is changing the way it distributes its Advance Notification Service, and will no longer make the security bulletins publicly available, according to eWeek.

Anonymous hackers ‘declare war’ on al Qaeda and Islamic State

The Anonymous hacking collective has “declared war” against the terrorists said to be responsible for the shootings of staff at France’s satyrical Charlie Hebdo magazine, reports The Telegraph.

‘Critical Security Updates’ cancelled for 939 million Android users

Google has revealed that Android smartphones and tablets running versions of the software released before 4.3 (Jellybean) will no longer be given official updates to an important part of the software

Obama calls for 30 day data breach notification and greater student privacy

President Barack Obama is today to propose legislation that would ensure companies inform customers of any leaks within 30 days of a data breach, reports Physorg.

Top 5 tips for safer Paypal payments

Paypal is one of the safest ways to make online payments, but there can still be security breaches if you’re not careful. Keep in mind these top 5 tips when paying online or sending money to your contacts

Ello Privacy – What you need to know

Ello Privacy was launched in March 2014 as an ad-free social network alternative, however the site still needs access to your personal data. Here’s the lowdown on the network’s key privacy principles.

How to transfer your data from iPhone to Android

Transferring all your data from iPhone to Android may seem like a hassle, but these 5 simple tips will make the transition a lot easier.

The drones are coming, what could go wrong?

Continuing from Consumer Electronics Show 2015 here in Las Vegas where we were covering this week the first impresisions of the show and also some lessons that this digital invasion is leaving us. Now, we will approach another interesting topic that involves privacy and new technology: drones.

Internet of Things Privacy: FTC chairwoman warns of risks

The Chairwoman of the Federal Trade Commission has offered stern warnings of privacy in relation to the Internet of Things in her opening remarks at CES 2015, reports SC Magazine.

Christmas gadgets could cause corporate security issues says Ernst & Young

Consultancy firm Ernst and Young have warned that employees returning to work with new smartphones and tablets purchased over the Christmas period could be a security risk for companies.

ATM hijacked via smartphone and USB port

Thieves have managed to extract money from an ATM with just a Samsung Galaxy S4, a circuit board and the machine’s USB based circuitboard reports Krebs on Security.

Digital Invasion: 3 things we learned from CES 2015

Ever lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? There’s an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.

Facebook privacy – why statements about copyright don’t do anything

Facebook users around the world have reported the return of the network’s longer-lasting hoaxes – a legal disclaimer which allows users to regain copyright over their images and other content. Here’s why it doesn’t work.

Companies to spend more on cybersecurity in 2015

In the wake of several high profile hacks in 2014, companies are set to spend more on cybersecurity this year, according to a survey by Piper Jaffray.

Holiday hacks down despite record-breaking shopping numbers

Retail cybercrime across the holiday season dropped, despite record business for companies across Black Friday and Cyber Monday, according to research from IBM, reported by Tech Week Europe.

Windows exploitation in 2014

Today, we published our research about Windows exploitation in 2014. This report contains interesting information about vulnerabilities in Microsoft Windows and Office patched over the course of the year, drive-by download attacks and mitigation techniques.

Police recommended UK security firm fixes ‘shopping list for burglars’

A website recommended by large portions of the UK’s police forces has fixed a privacy bug that provided a “shopping list for burglars” after being tipped off to the exploit by a security researcher, reports the BBC.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Stephen Cobb

Graham Cluley

Lukas Stefanko

David Harley

Robert Lipovsky

Lysa Myers

Joan Calvet

Olivier Bilodeau

Cameron Camp

Marc-Etienne M.Léveillé

Copyright © 2015 ESET, All Rights Reserved.